Displaying 20 results from an estimated 70000 matches similar to: "Asterisk 1.2.16 Released"
2007 Mar 02
4
Asterisk 1.4.1 Released
The Asterisk and Zaptel development teams have released Asterisk 1.4.1.
This release contains a very large number of bug fixes, including a fix
for the recently discovered security vulnerability.
It also contains a complete rewrite of the Shared Line Appearance (SLA)
support that was first released as part of Asterisk 1.4.0. The new
version of this functionality has been tested against a variety
2007 Mar 02
4
Asterisk 1.4.1 Released
The Asterisk and Zaptel development teams have released Asterisk 1.4.1.
This release contains a very large number of bug fixes, including a fix
for the recently discovered security vulnerability.
It also contains a complete rewrite of the Shared Line Appearance (SLA)
support that was first released as part of Asterisk 1.4.0. The new
version of this functionality has been tested against a variety
2007 Mar 21
0
Asterisk 1.4.2 Released
The Asterisk and Zaptel development teams have released Asterisk 1.4.2.
In addition to minor bug fixes, this release includes:
- improved SLA support, sample configurations and documentation
- fixes for incoming DTMF handling in the IAX2 channel driver
There are also two security-related changes in this version:
- a fix for a SIP channel driver remote DoS vulnerability
2007 Mar 21
0
Asterisk 1.4.2 Released
The Asterisk and Zaptel development teams have released Asterisk 1.4.2.
In addition to minor bug fixes, this release includes:
- improved SLA support, sample configurations and documentation
- fixes for incoming DTMF handling in the IAX2 channel driver
There are also two security-related changes in this version:
- a fix for a SIP channel driver remote DoS vulnerability
2007 Mar 21
0
Asterisk 1.2.17 Released
The Asterisk and Zaptel development teams have released Asterisk version
1.2.17.
Along with minor bug fixes, this release incorporates a fix for the SIP
DoS vulnerability recently discovered by INRIA Lorraine
(http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html).
All users of Asterisk 1.2 with the SIP channel driver loaded and
connected to an untrusted network are urged to
2007 Mar 21
0
Asterisk 1.2.17 Released
The Asterisk and Zaptel development teams have released Asterisk version
1.2.17.
Along with minor bug fixes, this release incorporates a fix for the SIP
DoS vulnerability recently discovered by INRIA Lorraine
(http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html).
All users of Asterisk 1.2 with the SIP channel driver loaded and
connected to an untrusted network are urged to
2006 Oct 18
0
Asterisk 1.2.13 released - Security Vulnerability Fix
The Asterisk Development team has released an update to Asterisk 1.2,
Asterisk 1.2.13.
This release contains a fix for a security vulnerability recently found
in the chan_skinny channel driver (for Cisco SCCP phones). This
vulnerability would enable an attacker to remotely execute code as the
system user running Asterisk (frequently 'root'). The exploit does not
require that the
2006 Oct 18
0
Asterisk 1.2.13 released - Security Vulnerability Fix
The Asterisk Development team has released an update to Asterisk 1.2,
Asterisk 1.2.13.
This release contains a fix for a security vulnerability recently found
in the chan_skinny channel driver (for Cisco SCCP phones). This
vulnerability would enable an attacker to remotely execute code as the
system user running Asterisk (frequently 'root'). The exploit does not
require that the
2007 Mar 20
1
Zaptel 1.2.16 Released
The Asterisk and Zaptel development teams have released Zaptel version
1.2.16.
In addition to minor bug fixes, this release fixes a build-time problem
on systems where the default language is not English, and also corrects
a regression in the driver for the Digium dual- and quad-span cards with
hardware echo cancelers that could result in kernel panics.
Thanks for your support of Asterisk and
2007 Mar 20
1
Zaptel 1.2.16 Released
The Asterisk and Zaptel development teams have released Zaptel version
1.2.16.
In addition to minor bug fixes, this release fixes a build-time problem
on systems where the default language is not English, and also corrects
a regression in the driver for the Digium dual- and quad-span cards with
hardware echo cancelers that could result in kernel panics.
Thanks for your support of Asterisk and
2006 Jun 05
1
Asterisk 1.2.9 and 1.0.11 Released -- Security Fix
The Asterisk Development Team today released Asterisk 1.2.9 and Asterisk
1.0.11 to address a security vulnerability in the IAX2 channel driver
(chan_iax2). The vulnerability affects all users with IAX2 clients that
might be compromised or used by a malicious user, and can lead to denial
of service attacks and random Asterisk server crashes via a relatively
trivial exploit.
All users are urged to
2006 Oct 18
0
Asterisk 1.0.12 released - Security Vulnerability Fix
The Asterisk Development team has released an update to Asterisk 1.0,
Asterisk 1.0.12.
This release contains a fix for a security vulnerability recently found
in the chan_skinny channel driver (for Cisco SCCP phones). This
vulnerability would enable an attacker to remotely execute code as the
system user running Asterisk (frequently 'root'). The exploit does not
require that the
2006 Oct 18
0
Asterisk 1.0.12 released - Security Vulnerability Fix
The Asterisk Development team has released an update to Asterisk 1.0,
Asterisk 1.0.12.
This release contains a fix for a security vulnerability recently found
in the chan_skinny channel driver (for Cisco SCCP phones). This
vulnerability would enable an attacker to remotely execute code as the
system user running Asterisk (frequently 'root'). The exploit does not
require that the
2006 Jun 06
0
Asterisk 1.2.9.1 and 1.0.11.1 Released -- Security Fix
The Asterisk Development Team today re-released Asterisk 1.2.9.1 and
Asterisk 1.0.11.1 to address a security vulnerability in the IAX2
channel driver (chan_iax2). The vulnerability affects all users with
IAX2 clients that might be compromised or used by a malicious user, and
can lead to denial of service attacks and random Asterisk server crashes
via a relatively trivial exploit. These re-releases
2006 Jun 06
0
Asterisk 1.2.9.1 and 1.0.11.1 Released -- Security Fix
The Asterisk Development Team today re-released Asterisk 1.2.9.1 and
Asterisk 1.0.11.1 to address a security vulnerability in the IAX2
channel driver (chan_iax2). The vulnerability affects all users with
IAX2 clients that might be compromised or used by a malicious user, and
can lead to denial of service attacks and random Asterisk server crashes
via a relatively trivial exploit. These re-releases
1996 Nov 25
0
LSF Update#14 v1.2 "lpr vulnerability"
-----BEGIN PGP SIGNED MESSAGE-----
$Id: lpr-vulnerability-0.6-linux,v 1.2 1996/11/25 22:39:20 alex Exp $
Linux Security FAQ Update
lpr Vulnerability
Mon Nov 25 16:56:59 EST 1996
Copyright (C) 1995,1996 Alexander O. Yuriev (alex@bach.cis.temple.edu)
CIS Laboratories
2006 Jun 05
0
Asterisk 1.2.9 and 1.0.11 Released -- Security Fix
The Asterisk Development Team today released Asterisk 1.2.9 and Asterisk
1.0.11 to address a security vulnerability in the IAX2 channel driver
(chan_iax2). The vulnerability affects all users with IAX2 clients that
might be compromised or used by a malicious user, and can lead to denial
of service attacks and random Asterisk server crashes via a relatively
trivial exploit.
All users are urged to
1996 Nov 22
0
LSF Update#14: Vulnerability of the lpr program.
-----BEGIN PGP SIGNED MESSAGE-----
$Id: lpr-vulnerability-0.6-linux,v 1.1 1996/11/22 21:42:46 alex Exp $
Linux Security FAQ Update
lpr Vulnerability
Thu Nov 21 22:24:12 EST 1996
Copyright (C) 1995,1996 Alexander O. Yuriev (alex@bach.cis.temple.edu)
CIS Laboratories
2007 Apr 04
2
make Zaptel 1.2.16 'struct inode' has no member named 'u'.
On attempting to make Zaptel 1.2.16 on FC5, I get the following messages:
/usr/src/zaptel-1.2.16/xpp/xbus-core.c: In function 'debugfs_open':
/usr/src/zaptel-1.2.16/xpp/xbus-core.c:171: error: 'struct inode' has no member named 'u'
make[3]: *** [/usr/src/zaptel-1.2.16/xpp/xbus-core.o] Error 1
make[2]: *** [/usr/src/zaptel-1.2.16/xpp] Error 2
make[1]: ***
2007 Nov 08
0
AST-2007-024 - Fallacious security advisory spread on the Internet involving buffer overflow in Zaptel's sethdlc application
Asterisk Project Security Advisory - AST-2007-024
+------------------------------------------------------------------------+
| Product | Zaptel |
|--------------------+---------------------------------------------------|
| Summary | Potential buffer overflow from command line |
| |